Search

Data Manipulation: Attacks and Mitigation

Confidentiality, Integrity, and Availability In terms of cybersecurity, the Confidentiality, Integrity, and Availability, also known as the CIA Triad, is a benchmark model for the development of security policies used to govern and evaluate how an organization handles data when it is stored, transmitted or processed. All risks, threats, and vulnerabilities are measured for their…

What is Malvertising?

Malvertising is a malicious form of online advertisement used to inject malware into legitimate online advertising networks and webpages. Advertisements are produced with significant effort to attract users and sell or advertise a product, which makes for a prime platform for spreading malware. Malvertising can exist even on the most popular and reputable websites without…

A Collaboration Pipeline for Cybersecurity Research, Analytics, and Tools

Cybersecurity Data Gap Network and host-based sensors collect data that are foundational for current-day cybersecurity technologies such as intrusion detection and prevention systems. However, for cybersecurity incidents, these data only tell a part of the story. Lacking are the data from the inside view (or attacker perspective), including specific attacker actions, tools used, and strategies….

/